We are entering the age of agentic AI — systems that don’t just assist but act. These agents can make decisions, carry out tasks, and adapt to changing contexts — autonomously. But with autonomy comes accountability. And the question becomes:…
Tag: Security Boulevard
Randall Munroe’s XKCD ‘Bridge Types’
<a class=” sqs-block-image-link ” href=”https://xkcd.com/3097/” target=”_blank”> <img alt=”” height=”581″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/79339ba7-5690-472d-ab49-86b56af20c4e/bridge_types.png?format=1000w” width=”740″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Bridge Types’ appeared first on Security Boulevard.…
OffensiveCon25 – Parser Differentials: When Interpretation Becomes a Vulnerability
Author/Presenter: Joernchen Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton Berlin; and via the organizations YouTube channel. Thanks and a…
BadBox 2.0 Botnet Infects Million-Plus Devices, FBI Says
BadBox 2.0, which emerged two years after the initial iteration launched and a year after it was disrupted by vendors, has infected more than 1 million IoT consumer devices, prompting a warning to such systems from the FBI. The post…
Security in the Age of AI with Anand Oswal
At this year’s RSAC Conference, one theme loomed large: AI isn’t just a tool anymore—it’s a battleground. Industry veteran Anand Oswal discussed how AI is reshaping both sides of the cybersecurity equation: It’s amplifying the speed and scale of attacks…
The State of Identity Security with Morey Haber
At RSAC Conference 2025, BeyondTrust’s Chief Security Advisor Morey Haber offered a forward-looking take on the state of identity security and the real-world gaps that still exist in enterprise environments. With over two decades in the field and a perspective…
Security in the Age of AI with Anand Oswal at RSAC Conference 2025
At this year’s RSAC Conference, one theme loomed large: AI isn’t just a tool anymore—it’s a battleground. Industry veteran Anand Oswal discussed how AI is reshaping both sides of the cybersecurity equation: It’s amplifying the speed and scale of attacks…
Trump EO Takes Aim at Biden, Obama Provisions for Identity, Sanctions, AI
In a new cybersecurity EO, President Trump is taking a hatchet to some mandates imposed by Presidents Biden and Obama around digital identities and election interference and narrowing requirements for AI, quantum computing, and software development. The post Trump EO…
No Lollygagging: Cisco IOS XE Flaw With 10.0 Rating Should be Patched Now
Cisco IOS XE Flaw: The security experts are all in agreement that organizations should rush to fix the vulnerability. The post No Lollygagging: Cisco IOS XE Flaw With 10.0 Rating Should be Patched Now appeared first on Security Boulevard. This…
Contrast Security Combines Graph and AI Technologies to Secure Applications
Contrast Security today made available an update to its application detection and response platform that leverages graph and artificial intelligence (AI) technologies to provide security operations teams with a digital twin of the applications and associated application programming interfaces (APIs)…
RSA Extends Reach of Passwordless Management Platform
RSA has updated its passwordless identity management platform to add support for desktops that are connected to the Microsoft Entra ID directory service. The post RSA Extends Reach of Passwordless Management Platform appeared first on Security Boulevard. This article has…
Why MSSPs Must Prioritize Cyber Risk Quantification in 2025
Have you ever had a client ask, “How much risk are we facing?” and all you had was a pie chart to show them? In 2025, that doesn’t cut it. Today’s business executives expect more. They want risk explained in…
Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA’s…
Proactive Measures for NHI Threat Detection
What is the Critical Core of NHI Management? Non-Human Identities (NHIs), the machine identities used in cybersecurity, play an essential role in maintaining an organization’s security status. Created by combining a “Secret” (an encrypted password, token, or key) and the…
Stay Reassured with Enhanced NHI Safety
Can Enhanced NHI Safety Bring You Peace of Mind? The management of Non-Human Identities (NHIs) and Secrets has become increasingly crucial. With all the buzz around the subject, does the thought of enhanced NHI safety reassure you? Although managing NHIs…
Confidence in Handling NHIs Effectively
What if there was a way to drastically reduce the security risks in your cloud environment? Imagine having the ability to identify and mitigate any risk proactively, without any hassles. It turns out that method exists, and it’s called Non-Human…
OffensiveCon25 – Skin In The Game: Survival Of GPU IOMMU Irregular Damage
Authors/Presenters: Fish and Ling Hanqin Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton Berlin; and via the organizations YouTube channel.…
From Quarterbacks to CxOs: Why We All Need a Coach
At one time, having a personal coach was just for top-tier athletes, but no longer. Whether you prefer the term “mentor” or “life coach,” there’s growth potential for us all to consider. The post From Quarterbacks to CxOs: Why We…
From StackStorm to DeepTempo
And what does it tell us about Cybersecurity? As the founding CEO of StackStorm and now DeepTempo, I’ve seen how the needs of CISOs and SOCs have changed over the last 10+ years. New challenges and a better color scheme! When we…
Scalable Solutions for NHI Management
Is Your Organization Implementing Scalable Solutions for NHI Management? Is your business laying a solid groundwork for efficient Non-Human Identity (NHI) management? If not, you’re likely exposing your organization to unnecessary risks. Data leaks and breaches could be lurking around…